SB2021012035 - Multiple vulnerabilities in Enterprise Manager Base Platform



SB2021012035 - Multiple vulnerabilities in Enterprise Manager Base Platform

Published: January 20, 2021 Updated: July 19, 2021

Security Bulletin ID SB2021012035
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Medium 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Desereliazation of untrusted data (CVE-ID: CVE-2016-1000031)

The vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the target system.

The weakness exists in DiskFileItem class of the FileUpload library due to deserialization of untrusted data. A remote attacker can execute arbitrary code under the context of the current process.

Successful exploitation of the vulnerability may result in system compromise.

2) Deserialization of Untrusted Data (CVE-ID: CVE-2020-11973)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to Apache Camel Netty enables Java deserialization by default. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) XML External Entity injection (CVE-ID: CVE-2019-13990)

The vulnerability allows a remote attacker to conduct an XML External Entity (XXE) attack on a targeted system.

The vulnerability exists due to insufficient validation of user-supplied XML input in the "initDocumentParser" function in the "xml/XMLSchedulingDataProcessor.java" file. A remote authenticated attacker can submit a malicious job description to the targeted system and conduct an XXE attack.



Remediation

Install update from vendor's website.